Showing 41 - 60 results of 125 for search 'proof complexity', query time: 0.05s Refine Results
  1. 41

    A note on irreducible Heegaard diagrams by Alberto Cavicchioli, Fulvia Spaggiari

    Published 2006-01-01
    “…The first example was given by Im and Kim but our diagram has smaller complexity. Furthermore the proof presented here is quite different to that of the quoted authors, and permits also to obtain a simple alternative proof of their result. …”
    Get full text
    Article
  2. 42

    Application of the Flux-Variance Technique for Evapotranspiration Estimates in Three Types of Agricultural Structures by Ori Ahiman, Yonatan Mekhmandarov, Moran Pirkner, Josef Tanny

    Published 2018-01-01
    “…However, within the insect-proof screenhouse (below the screen) and the plastic-covered greenhouse, R2 of the energy balance closure was poor; hence, the alternative simple method could not be used. …”
    Get full text
    Article
  3. 43

    TIE‐GCM ROPE ‐ Dimensionality Reduction: Part I by Piyush M. Mehta, Richard J. Licata

    Published 2025-01-01
    “…However, the computational complexity of such models have primarily kept them being used operationally. …”
    Get full text
    Article
  4. 44

    Algebraic Cryptanalysis Scheme of AES-256 Using Gröbner Basis by Kaixin Zhao, Jie Cui, Zhiqiang Xie

    Published 2017-01-01
    “…Analysis shows that the complexity of our scheme is lower than that of the exhaustive attack.…”
    Get full text
    Article
  5. 45

    Global solutions to the Cauchy problem of BNSP equations in some classes of large data by Jie Qi, Weike Wang

    Published 2024-09-01
    “…It made the whole proof more simple and clear, meanwhile, resulted in the large time decaying estimates of the solution. …”
    Get full text
    Article
  6. 46

    The Principle of Mathematical Induction: Applications in Physical Optics by Joseph Ivin Thomas

    Published 2022-01-01
    “…The bare rudiments of the principle of mathematical induction as a method of proof date back to ancient times. In the contemporary university milieu, the demonstrative scheme is taught as part of a course in discrete mathematics, set theory, number theory, graph theory, group theory, game theory, linear algebra, logic, and combinatorics. …”
    Get full text
    Article
  7. 47

    Functional switching among dynamic neuronal hub-nodes in the brain induces maintenance/transition of cognitive states by Jasleen Gund, Yashaswee Mishra, B. N. Mallick, R. K. Brojen Singh

    Published 2025-01-01
    “…The multifractal spectrum width categorized VST as highly non-linear and more complex than vigilance states. The NREMS possesses a more complex cortical structure but it exhibits lower functional complexity than REMS and Wake. …”
    Get full text
    Article
  8. 48

    A Mechanically Proved and an Incremental Development of the Session Initiation Protocol INVITE Transaction by Rajaa Filali, Mohamed Bouhdadi

    Published 2014-01-01
    “…The Event-B refinement concept allows an incremental development by defining the studied system at different levels of abstraction, and Rodin discharges almost all proof obligations at each level. This interaction between modeling and proving reduces the complexity and helps in assuring that the INVITE transaction SIP specification is correct, unambiguous, and easy to understand.…”
    Get full text
    Article
  9. 49

    A novel minimal exposure path problem in wireless sensor networks and its solution algorithm by Hao Feng, Lei Luo, Yong Wang, Miao Ye, Rongsheng Dong

    Published 2016-08-01
    “…This article also provides a proof for the convergence of the designed algorithm. …”
    Get full text
    Article
  10. 50

    Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks by Libing Wu, Jing Fan, Yong Xie, Jing Wang, Qin Liu

    Published 2017-03-01
    “…However, the bilinear pairing operation is one of the most complex cryptographic operations and the assumption of tamper-proof device is very strong. …”
    Get full text
    Article
  11. 51

    Pipelined Training with Stale Weights in Deep Convolutional Neural Networks by Lifu Zhang, Tarek S. Abdelrahman

    Published 2021-01-01
    “…The growth in size and complexity of convolutional neural networks (CNNs) is forcing the partitioning of a network across multiple accelerators during training and pipelining of backpropagation computations over these accelerators. …”
    Get full text
    Article
  12. 52

    The differentiation state of small intestinal organoid models influences prediction of drug-induced toxicity by Jessica A. Klein, Julia D. Heidmann, Tomomi Kiyota, Aaron Fullerton, Kimberly A. Homan, Julia Y. Co

    Published 2025-01-01
    “…Traditional in vitro models using transformed cell lines do not capture this cellular complexity, and often fail to predict intestinal toxicity. …”
    Get full text
    Article
  13. 53

    Methods of committing criminal offences related to raiding by S. A. Tiulieniev

    Published 2024-06-01
    “…Given that the method embodies the objective side of a criminal offence, the complexity of its establishment and proof in the cognitive activity of an investigator, detective, coroner, therefore, in the context of cognition of raiding, it is subject to a thorough study. …”
    Get full text
    Article
  14. 54

    Development of algorithm for receiving and decoding input signal using MTD decoder for subscriber terminals operating with low-orbit spacecraft by D. P. Sedunov, A. S. Zhunusova

    Published 2021-03-01
    “…The relevance of the topic is determined by the need to increase the speed of data transmission in satellite telecommunication systems through the use of noise-proof coding. The speed of data transmission in a radio channel is actually determined by the level of interference present due to the fact that the radio transmission medium is a public environment and other electronic devices operate in it. …”
    Get full text
    Article
  15. 55

    On the Parametric Stokes Phenomenon for Solutions of Singularly Perturbed Linear Partial Differential Equations by Stéphane Malek

    Published 2012-01-01
    “…The proof rests on the construction of neighboring sectorial holomorphic solutions to the first mentioned equation whose differences have exponentially small bounds in the perturbation parameter (Stokes phenomenon) for which the classical Ramis-Sibuya theorem can be applied. …”
    Get full text
    Article
  16. 56

    Single-Round Patterned DNA Library Microarray Aptamer Lead Identification by Jennifer A. Martin, Peter A. Mirau, Yaroslav Chushak, Jorge L. Chávez, Rajesh R. Naik, Joshua A. Hagen, Nancy Kelley-Loughnane

    Published 2015-01-01
    “…The DNA library was specifically designed to increase the probability of binding by enhancing structural complexity in a sequence-space confined environment, much like generating lead compounds in a combinatorial drug screening library. …”
    Get full text
    Article
  17. 57

    The Effects of Different Phase on Independent Visual Fields SSVEP Responses by Dalu Zheng, Songyun Xie, Xinzhou Xie, Michael Scholz, Hao Tang

    Published 2025-01-01
    “…Binocular disparate stimulation based on steady-state visual evoked potentials (SSVEP) generates more recognizable features but also introduces complexity hardening the interpretability of SSVEP responses. …”
    Get full text
    Article
  18. 58

    A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents by Omar Tayan, Muhammad N. Kabir, Yasser M. Alginahi

    Published 2014-01-01
    “…This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. …”
    Get full text
    Article
  19. 59

    Three-Dimensional Digital Documentation for the Conservation of the Prambanan Temple Cluster Using Guided Multi-Sensor Techniques by Anindya Sricandra Prasidya, Irwan Gumilar, Irwan Meilano, Ikaputra Ikaputra, Rochmad Muryamto, Erlyna Nour Arrofiqoh

    Published 2025-01-01
    “…Therefore, we can conclude that our approach is promising for complex heritage documentation. These results provide a solid foundation for future analyses, particularly in assessing structural vulnerabilities and informing conservation strategies.…”
    Get full text
    Article
  20. 60

    On numerically effective log canonical divisors by Shigetaka Fukuda

    Published 2002-01-01
    “…Let (X,Δ) be a 4-dimensional log variety which is proper over the field of complex numbers and with only divisorial log terminal singularities. …”
    Get full text
    Article